Skip to content

Pharns/giap-public

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GIAP - GRC Intake Automation Platform (Public Overview)

Status Scope License CI/CD Demo Outputs

Privacy-first, self-hosted intake automation for GRC consulting. This is a public-safe, redacted overview that demonstrates GRC engineering capability without exposing proprietary workflows or client data.

Live Demo

Access the public demo (read-only): https://portal.aamcyber.work/demo

CI/CD (Private Repo)

This public overview mirrors a production repo that runs automated CI and deployment:

  • CI: API and UI lint/test workflows on push and pull request
  • CD: portal deploy workflow on main with secrets + secure remote sync
  • Gates: dependency install, lint, unit tests, and smoke checks
  • Controls: secrets verification and SSH key handling for deploy

What This Is

  • Evidence-first intake automation with governance gates
  • Multi-framework intake mapping and audit-ready summaries
  • Privacy-preserving workflow orchestration

Framework Alignment

  • SOC 2: CC1, CC3, CC4, CC6, CC7
  • NIST CSF: ID.AM, ID.GV, ID.RA, PR.AC, PR.DS, DE.CM
  • ISO 27001: A.5, A.6, A.8, A.12, A.18

High-Level Architecture (Redacted)

flowchart TB
  Client[Client] --> Portal[Pre-Intake Portal]
  Portal --> Orchestrator[Workflow Orchestrator]
  Orchestrator --> CRM[Case System]
  Orchestrator --> Docs[Document Store]
  Orchestrator --> Sign[Signature Service]
  Orchestrator --> GRC[Control Mapping]
Loading

Evidence Flow (Redacted)

sequenceDiagram
  participant Client
  participant Portal
  participant Orchestrator
  participant Evidence
  Client->>Portal: Submit intake
  Portal->>Orchestrator: Validate + route
  Orchestrator->>Evidence: Create intake bundle
  Evidence-->>Orchestrator: Summary + control map
Loading

Threat Model (Redacted)

flowchart LR
  Ext[External User] --> Portal
  Portal --> Orchestrator
  Orchestrator --> Data[(Evidence Store)]
  Admin[Admin Access] --> Orchestrator
  Data --> Audit[Audit Logs]
Loading

Compliance Mapping (Sample)

Control Evidence Signal Purpose
SOC2 CC6 Access control records Identity and access governance
NIST PR.AC Intake access logs Authorized access validation
ISO A.8 Data classification tags Asset and data handling

Example Outputs

  • examples/giap-intake.json - sanitized intake payload
  • examples/giap-summary.md - redacted executive summary
  • examples/giap-control-map.md - synthetic control mapping excerpt
  • examples/giap-evidence-manifest.json - synthetic evidence manifest

Demo-Only Flow (Conceptual)

  1. Client submits pre-intake form.
  2. Orchestrator stores intake and opens a case.
  3. Engagement letter is generated and signed.
  4. Control mapping summary is produced.
  5. Intake package is ready for assessment.

Key Decisions

  • Deposit gate to enforce scope discipline.
  • Evidence stored with minimal access paths.
  • Redacted public outputs to protect IP and client privacy.

Scope and Redaction

  • Proprietary workflow logic, endpoints, and credentials are omitted.
  • Examples are synthetic and non-client.

Disclaimer

This is a public-safe overview. Do not use as a production system. No client data or proprietary infrastructure details are included.

About

Public-safe overview of a GRC intake automation platform (multi-framework, audit-ready). Demo: portal.aamcyber.work/demo

Topics

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors